Session Schedule. Session: 1 Date: 27 th Sept Day: Saturday Time: 1030 HRS to 1300 HRS Category: Advance Database Management System and others
|
|
- Lee McKenzie
- 8 years ago
- Views:
Transcription
1 Session Schedule Session: 1 Time: 1030 HRS to 1300 HRS Category: Advance Database Management System and others 1 Diversification of Web Search Results using Post-Retrieval Clustering Sarvesh Kumar, S K Jain, R M Sharma Paper id.60 2 IATSJ: Identification of Anomalies in Time Series Data using Similarity Join Processing Vishwanath R H, Vaishnavi R,Srikantaiah K C, Venugopal K R and L M Patnaik Paper id.67 3 A Survey on Ontology Matching Techniques Satish Kumar, Vikram Singh and Balwinder Saini Paper id.81 4 An Interactive Interface for Instilling Trust and providing Diverse Recommendations Rahul Katarya, Ivy Jain and Hitesh Hasija Paper id.97 5 Evaluation of Filtration and Pruning Approach for Apriori Algorithm Lalit Mohan Goyal, M. M. Sufyan Beg Paper id Using Mahout for clustering similar Twitter Users Performance Evaluation of K-Means and its comparison with Fuzzy K-Means Eeti Jain, S K Jain Paper id Pathway Clusters of Aging Genes using Data Mining Techniques Vidya A, Kalaivani M, Venugopal K R and L M Patnaik Paper id Two Level Dynamic Approach for Feature Envy Detection Swati Kumar and Jitender Kumar Chhabra Paper id.45 9 A Comparison of ARIMA, Neural Network and a Hybrid Technique for Debian Bug Number Prediction Jayadeep Pati and K K Shukla Paper id.139 xiv
2 Session: 2 Time: 1030 HRS to 1300 HRS Category: Artificial Intelligence and others 1 Resolving issues in Parsing Technique in Machine Translation from Hindi language to English language Mrs. Shachi Mall and Umesh Chandra Jaiswal, Paper id.49 2 A Stochastic Greedy Heuristic Algorithm for the Orienteering Problem Madhushi Verma, Bijeeta Pal, Mukul Gupta and K. K. Shukla Paper id Rural Indian Fingerprint Image De-noising and Techniques to remove noise for image Enhancement and Improve the Recognition Rate Babasaheb V. Bhalerao and Ramesh R. Manza Paper id An Ordered Weighted Operator Approach towards Web Usage Mining Shruti Kohli and Ankit Gupta Paper id Game theoretic Approaches for Job Scheduling in Cloud Computing: A Survey Alaka Ananth and Prof. K. Chandra Sekaran Department of Computer Science and Engineering Paper id.43 6 A Survey on Scheduling and Load Balancing Techniques in Cloud Computing Environment Subhadra Bose Shaw and A.K. Singh Paper id Image Registration Techniques using Parallel Computing in Multicore Environment and Its Applications in Medical Imaging: An Overview Sanjay Saxena, Shiru Sharma and Neeraj Sharma Paper id Group Tenant based SaaS Application Gupta Nitu Sajjanlal, Wani Rohit Bhaginath and Varshapriya Jyotinagar Paper id Improving The Efficiency of Genetic Algorithm Approach to Virtual Machine Allocation Christina Terese Joseph, K Chandrasekaran and Robin Cyriac Paper id.78 xv
3 Session: 3 Time: 1030 HRS to 1300 HRS Category: Security 1 Grid System Security Without Public Key Settings Mrudula Sarvabhatla, M.Giri and Chandra Sekhar Vorugunti Paper id.3 2 Cryptanalysis of A robust and effective smart card-based remote user authentication mechanism using hash function Mrudula Sarvabhatla, Prof M.Giri and ChandraSekhar Vorugunti Paper id.11 3 A Secured Approach to Protect SIP Signaling Message Narendra M. Shekokar Paper id.12 4 Mobile WiMAX Network Security Threats and Solutions: A Survey Vinod Kumar Jatav and Vrijendra Singh Paper id.25 5 Metamorphic Virus Detection using Feature Selection Techniques Jikku Kuriakose and Vinod P. Paper id.72 6 A Copy-move Image Forgery Detection Based on Speeded Up Robust Feature Transform and Wavelet Transforms Mohammad Farukh Hashmi, Vijay Anand and Avinash G. Keskar Paper id Comparative Study of Matrix Based Key Management Schemes Satyendra and Priyanka Ahlawat Paper id An Extended PlayFair Cipher using Rotation and Random Swap patterns Swati Hans, Rahul Johari and Vishakha Gautam Paper id Formal Verification of Security Protocol with B method Subodh Kumar, Girish Chandra and Divakar Yadav Paper id A Model for Secure Information Storage and Retrieval on Cloud using Multimodal Biometric Cryptosystem Panchami G. Rudrakshi and Sanjeevkumar M. Hatture Paper id.203 xvi
4 Session: 4 Time: 1400 HRS to 1630 HRS Category: Computer Communication 1 QoS Driven Distributed Multi-Channel Scheduling MAC Protocol for Multihop WSNs Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar and L M Patnaik Paper id.22 2 A New LEACH-based Routing Protocol for Energy Optimization in Wireless Sensor Network Jyoti Singh and Bhanu Pratap Singh and Subhadra Shaw Paper id.57 3 Simulation Based Comparative Study of MAODV, ODMRP and Gossip Protocol Prachi Gupta and Bijendra Kumar Paper id.61 4 A Low Power Folded Cascode Low Noise Amplifier for Multistandard Wireless Applications Anand A.Kukde, S.Kumaravel and B.Venkataramani Paper id.90 5 Route Discovery in Mobile Ad Hoc Network using an Optimum Angle Selection based approach Pravin Ranjan and R. Leela Velusamy Paper id.99 6 Joint Iterative CCI and ICI Cancellation for STBC-OFDM System in Fast Fading Channel Jyoti P. Patra and Poonam Singh Paper id Performance Analysis of Rectangular, Triangular and E-shaped Microstrip Patch Antenna Arrays for Wireless Sensor Networks Shamanth Nagaraju, Bhushan V Kadam, Lucy J Gudino, Srinivasprasad M Nagaraja and Neisarg Dave Paper id Construction of Low Cost Virtual Backbone for Sensor Networks Komal Bansa and Awadhesh Kumar Singh Paper id A Semantic Search with Chord Protocol Utilizing Domain Ontology Shabir Ali and Saurabh Jha Paper id Mobile Agent Based Architecture to Prevent Session Hijacking Attacks in IEEE WLAN Saurabh Jha and Shabir Ali Paper id.126 xvii
5 Session: 5 Time: 1400 HRS to 1600 HRS Category: Computer Communication 1 Analysis and Design of Decentralized Conferencing using Wi- Fi based on P2P Architecture Nishant Chaubey and Aditya Trivedi Paper id Secure Ranked Fuzzy Multi-Keyword Search over Outsourced Encrypted Cloud Data Neelam S. Khan, C. Rama Krishna and Anu Khurana Paper id Impact of Node Density on the Performance of GSR & TORA Routing Protocols Priyanshu and Ashish K. Maurya Paper id Effect of Variable Dielectric Constant of Si Material Rods on 2-D Photonic Crystal Ring Resonator based Channel Drop Filter for ITU.T CWDM System Mayur Kumar Chhipa and Ekta Rewar Paper id A New Resource Allocation Protocol for Mobile Ad-hoc Networks (MANET) in Tactical Scenario Hemant K Pande, Kapil K Srivastava, Sunil Thapliyal and Lal Chand Mangal Paper id A Robust Hybrid-MAC Protocol for M2M Communications Pawan Kumar Verma, Rajeev Tripathi and Kshirasagar Naik Paper id Performance Analysis of Multicast Routing Protocols in Ad- Hoc Networks Kanwalpreet Kaur, Krishan Kumar Saluja and Rajdeep Singh Paper id Behavioral analysis of the Playout Buffer of VoIP Based Applications from client perspective Neha Tiwari Paper id.220 xviii
6 Session: 6 Date: 28 th Sept Day: Sunday Time: 1000 HRS to 1330 HRS Category: Computer Graphics & Multimedia and H/W & S/W Design 1 Genre Classification of Songs Using Neural Network Anshuman Goel, Mohd. Sheezan, Sarfaraz Masood and Aadam Saleem Paper id.17 2 Principal Component Analysis on Indian Currency Recognition Vishnu R and Bini Omman Paper id.32 3 A Framework for Key Frame Extraction from Surveillance Video Suresh C. Raikwar, Charul Bhatnagar and Anand Singh Jalal Paper id.87 4 Passive Copy Move Forgery Detection in Video Ramesh Chand Pandey, Sanjay Kumar Singh and K.K.Shukla Paper id A Novel Approach to Detect Fours in Cricket Videos Mridul Dixit and Charul Bhatnagar Paper id Analysis of Linear Filtering Techniques on X-Ray Image Sugandha Agarwal, Yash Joshi, O.P. Singh and Deepak Nagaria Paper id Fast Parameterized Word Matching on Compressed Text Rama Garg, Rajesh Prasad and Suneeta Agarwal Paper id Cognitive Radio Testbed using reconfigurable PIFA antenna and Energy Detection Sensing S. Manoj, A. G. Kothari and Abhay Samant Paper id.52 9 Circular Micro-strip(Coax Feed) Antenna Modelling using FDTD Method and Design using Genetic Algorithms: A Comparative Study on Different Types of Design Techniques Shibaji Chakraborty, Uddipan Mukherjee and Khushal Anchalia Paper id CORDIC based BPSK Modulator Parichay Kalra, Anand Kukde and B. Venkataramani Paper id A simulator based performance analysis of Multilevel Feedback Queue Scheduling Sanjay. K. Dwivedi and Ritesh Gupta Paper id CNTFET-Based Low Power Design of 4-input Ternary XOR Function Sneh Lata Murotiya, Anu Gupta and Ayan Pandit Paper id.178 xix
7 13 Centralized Remote Monitoring of Electrostatic Precipitators to Enforce Proper Usage Kingshuk Mukherjee, Nirmal Kumar Roy and Souvik Das Paper id Energy Efficient Solar Based Digital Electronic Weighing Machine Sandip N. Rikame and Pradip W. Kulkarni Paper id.236 xx
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Novel Approach
More informationUNIVERSITY OF DELHI -------------------
S.NO.AER/2015/106 MASTER OF BUSINESS ADMINISTRATION (EXECUTIVE) SECOND YEAR (IV SEMESTER) EXAMINATION, 2015 ----------- The following candidates after having passed the Second Year (IV Semester) Examination
More informationNATIONAL SUN YAT-SEN UNIVERSITY
NATIONAL SUN YAT-SEN UNIVERSITY Department of Electrical Engineering (Master s Degree, Doctoral Program Course, International Master's Program in Electric Power Engineering) Course Structure Course Structures
More informationTHE EDITORIAL AND TRASLATION SERVICE
THE EDITORIAL AND TRASLATION SERVICE 1 Post/Cadre-JOINT SECRETARY No. of Posts -1 Permanent - Nil Temporary - 1 Pay Scale : Rs. 37400-67000 + 10000 (G.P.) (PB-4) Group : A 1 SURESH KUMAR KATHURIA M.A.(HINDI,
More informationIEEE 2015-2016 JAVA TITLES
ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:
More informationCoCubes Id Candidate Name Roll Number Current Degree Current Branch Date of Pre-Assess Slot Time Testing Lab 1778635 AMAN BHARGAVA 13815602811 B.
CoCubes Id Candidate Name Roll Number Current Degree Current Branch Date of Pre-Assess Slot Time Testing Lab 1778635 AMAN BHARGAVA 13815602811 B.Tech Electronics and Communications Engineering 12/17/2014
More informationSTUDENT PROFILES 2014-15 M.TECH IN RADIO FREQUENCY DESIGN AND TECHNOLOGY
STUDENT PROFILES 2014-15 M.TECH IN RADIO FREQUENCY DESIGN AND TECHNOLOGY CENTRE FOR APPLIED RESEARCH IN ELECTRONICS INDIAN INSTITUTE OF TECHNOLOGY, DELHI http://care.iitd.ac.in Page 2 of 8 Dhritiman Kashyap
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationA Survey on Intrusion Detection System with Data Mining Techniques
A Survey on Intrusion Detection System with Data Mining Techniques Ms. Ruth D 1, Mrs. Lovelin Ponn Felciah M 2 1 M.Phil Scholar, Department of Computer Science, Bishop Heber College (Autonomous), Trichirappalli,
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationA Novel Technique to Isolate and Detect Jamming Attack in MANET
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Technique to Isolate and Detect Jamming Attack in MANET Harkiranpreet Kaur
More informationMaster Of Computer Application. Master Of Computer Application. Master Of Computer Application. Master Of Computer Application
SL NO REFERENCE ID CANDIDATE NAME HIGHEST QUALIFICATION HIGHEST SPECIALIZATION 1 CT20130927958 Hemlata Bachelor Of Technology Information Technology 2 CT20141220169 Shivani Gujral 3 CT20130927430 Sujata
More informationGURU GHASIDAS VISHWAVIDYALAYA BILASPUR (C.G.)
Roll List For Course :5 Years Integrated UG/PG in Forensic Science (B. Sc.+M.Sc.),Center : Guru Ghasidas AASHISH KUMAR 14159713210967 10011910003 AAYUSHI PATHAK 1415952108098 10011910004 ABHILASHA EKKA
More informationDepartment of Electronics & Communication Engineering
Department of Electronics & Communication Engineering INTRODUCTION Establishment The Department of Electronics & Communication Engineering was formed by trifurcation of the Department of Electrical Engineering
More informationUGC Human Resource Development Centre Jawaharlal Nehru University, New Delhi
Course coordinator: Dr. Rakesh Batabyal, Centre for Media Studies, School of Social Sciences, JNU Email: batabyal@mail.jnu.ac.in, batabyalr@yahoo.com 1. Summary UGC Human Resource Development Centre Jawaharlal
More informationIEEE JAVA Project 2012
IEEE JAVA Project 2012 Powered by Cloud Computing Cloud Computing Security from Single to Multi-Clouds. Reliable Re-encryption in Unreliable Clouds. Cloud Data Production for Masses. Costing of Cloud Computing
More informationHow To Prevent Network Attacks
Ali A. Ghorbani Wei Lu Mahbod Tavallaee Network Intrusion Detection and Prevention Concepts and Techniques )Spri inger Contents 1 Network Attacks 1 1.1 Attack Taxonomies 2 1.2 Probes 4 1.2.1 IPSweep and
More informationIEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper
IEEE International Conference on Computing, Analytics and Security Trends CAST-2016 (19 21 December, 2016) Call for Paper CAST-2015 provides an opportunity for researchers, academicians, scientists and
More informationInternet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: wkaqhsk0@seoultech.ac.kr Table of contents Open challenges
More informationDr. Shashank Srivastava. Contact. E-mail: shashank12@mnnit.ac.in. Telephone: 0532-2271365. Teaching. Courses Taught: Current Courses: Past Courses:
Dr. Shashank Srivastava Assistant Professor Department of Computer Science & Engineering Image Processing Department Building-First Floor Motilal Nehru National Institute of Technology Allahabad-211004,
More informationHow To Get A Computer Engineering Degree
COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME
More informationDetection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
More informationOptimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm
Optimizing Resource Consumption in Computational Cloud Using Enhanced ACO Algorithm Preeti Kushwah, Dr. Abhay Kothari Department of Computer Science & Engineering, Acropolis Institute of Technology and
More informationXIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25
XIV LIST OF FIGURES Figure Title Page 2.1 Schematics of the WEP. 21 2.2 Encryption in WEP technique 22 2.3 Decryption in WEP technique. 22 2.4 Process of TKIP 25 2.5 IEEE 802.1x Structure 30 2.6 RSNA Architecture
More informationStudents Profile MBA IT Specialization: Banking and Financial Markets
Students Profile MBA IT Specialization: Banking and Financial Markets Placement Cell: Ashwini Narayan (Placement Co-ordinator) E mail: placements@sicsr.ac.in (+91) 020-2567 5601 (Extn: 124) http://www.symbiosiscomputers.com
More informationJAVA IEEE 2015. 6 Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites Data Mining
S.NO TITLES Domains 1 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing 2 Anonymizing Collections of Tree-Structured Data 3 Making Digital Artifacts on the Web Verifiable and
More informationDesign & Simulation of 8-Shape Slotted Microstrip Patch Antenna
World Applied Sciences Journal 31 (6): 1065-1071, 2014 ISSN 1818-4952 IDOSI Publications, 2014 DOI: 10.5829/idosi.wasj.2014.31.06.1462 Design & Simulation of 8-Shape Slotted Microstrip Patch Antenna Sohag
More informationKeywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
More informationSecurity and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
More informationDoctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
More informationCHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
More informationMaster of Science (Electrical Engineering) MS(EE)
Master of Science (Electrical Engineering) MS(EE) 1. Mission Statement: The mission of the Electrical Engineering Department is to provide quality education to prepare students who will play a significant
More informationCOMPARATIVE ANALYSES OF ENHANCING BANDWIDTH OF MICRO STRIP PATCH ANTENNAS: A SURVEY AND AN IDEA
COMPARATIVE ANALYSES OF ENHANCING BANDWIDTH OF MICRO STRIP PATCH ANTENNAS: A SURVEY AND AN IDEA Anilkumar Patil 1, B.Suryakant 2 1 Asst Professor, SIT, Gulbarga 2 Professor, BKIT, Bhalki Abstract Microstrip
More informationCONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP)
CONTROL, COMMUNICATION & SIGNAL PROCESSING (CCSP) KEY RESEARCH AREAS Data compression for speech, audio, images, and video Digital and analog signal processing Image and video processing Computer vision
More informationSPY AGENT BASED SECURE DATA AGGREGATION IN WSN
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department
More informationCryptographic Data Security over Cloud
Cryptographic Data Security over Cloud Er. Lalit Gehlod Asst.Professor, Dept.Of Computer Engineering, Institute Of Engineering & Technology, Devi Ahilya University, Indore, India. Govind Patidar Dept.
More informationEncryption and Decryption for Secure Communication
Encryption and Decryption for Secure Communication Charu Rohilla Rahul Kumar Yadav Sugandha Singh Research Scholar, M.TECH CSE Dept. Asst. Prof. IT Dept. Asso. Prof. CSE Dept. PDMCE, B.Garh PDMCE, B.Garh
More informationLIST OF FIGURES. Figure No. Caption Page No.
LIST OF FIGURES Figure No. Caption Page No. Figure 1.1 A Cellular Network.. 2 Figure 1.2 A Mobile Ad hoc Network... 2 Figure 1.3 Classifications of Threats. 10 Figure 1.4 Classification of Different QoS
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationAN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING
AN EFFICIENT TASK SCHEDULING ALGORITHM TO OPTIMIZE RELIABILITY IN MOBILE COMPUTING Faizul Navi Khan, Kapil Govil Teerthanker Mahaveer University, Moradabad, U.P., India ABSTRACT Mobile computing can be
More informationProblems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
More informationIMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS
IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS Ajinkya Patil 1, Mrudang Shukla 2 1 Mtech (E&TC), 2 Assisstant Professor Symbiosis institute of Technology, Pune, Maharashtra,
More informationIEEE Projects in Embedded Sys VLSI DSP DIP Inst MATLAB Electrical Android
About Us : We at Ensemble specialize in electronic design and manufacturing services for various industrial segments. We also offer student project guidance and training for final year projects in departments
More informationReal-time Network Monitoring and Security Platform for Securing Next-Generation Network. Assoc. Prof. Dr. Sureswaran Ramadass
Real-time Network Monitoring and Security Platform for Securing Next-Generation Network Assoc. Prof. Dr. Sureswaran Ramadass The platform Definition A description of a software framework that makes services
More informationKeywords Wimax,Voip,Mobility Patterns, Codes,opnet
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effect of Mobility
More informationCHHATRAPATI SHAHUJI MAHARAJ MEDICAL UNIVERSITY LUCKNOW Apex College of Nursing, Varanasi MARKS SHEET
BSc. NURSING FIRST PROFESSIOL EXMITION OF 12 ENROLMENT NO. CBN0 ROLL NO. 261 ME OF CNDIDTE FTHER'S ME nish Srivastava Sunil Kumar Srivastava EXMITION HELD IN Jan-Jun 12 I Total of + I 0 0 1 26 40 19 61
More informationCommunication and Embedded Systems: Towards a Smart Grid. Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar
Communication and Embedded Systems: Towards a Smart Grid Radu Stoleru, Alex Sprintson, Narasimha Reddy, and P. R. Kumar Alex Sprintson Smart grid communication Key enabling technology Collecting data Control
More informationSecurity Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
More informationMaster s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
More informationName Company Positions. 1 Neha K Sambher IBM Practitioner. 2 Srishti IBM Practitioner. 3 Hansraj Bajaj Agency Manager
PLACEMENT RECORD 2014 1. School of Management: MBA 2012-14 Sr. No. Name Company Positions 1 Neha K Sambher IBM Practitioner 2 Srishti IBM Practitioner 3 Hansraj Bajaj Agency 4 Pritika BMA Money Finance
More informationThwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
More informationReview Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
Distributed Sensor Networks, Article ID 351047, 6 pages http://dx.doi.org/10.1155/2013/351047 Review Article Intrusion Detection Systems Based on Artificial Intelligence Techniques in Wireless Sensor Networks
More information9 ARM228 VIJAY KUMAR ARAMEX MHP MAHIPAL PUR L74 O P P P P O P P P P P P P P O P P P P P L L L L L L P P O P P
FORM XVI [See Rule 78(1) (a)(i)] Muster Roll Name and address of contractor : Scientific Security management services pvt. Ltd Name and address of establishment in/under which contract is carried on Aramex
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationSOUTH DISTRICT LEGAL SERVICES AUTHORITY FINAL LIST OF RECOMMENDED ADVOCATES MAGISTERIAL COURTS
MAGISTERIAL COURTS Sl. No. Nae Father s/ 1. Sh. Niraj Kr. Mishra Sh. Uesh Mishra 2. Ms. Raj Kuari Sh. Vijender Kuar Age Enrolent no. Address 31 D-1751/2006 Ch. No. 262, Lawyers Chaber Block, 29 D/3411/09
More informationAn Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
More informationComparison of WCA with AODV and WCA with ACO using clustering algorithm
Comparison of WCA with AODV and WCA with ACO using clustering algorithm Deepthi Hudedagaddi, Pallavi Ravishankar, Rakesh T M, Shashikanth Dengi ABSTRACT The rapidly changing topology of Mobile Ad hoc networks
More informationPSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
More informationDynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
More informationOn the features and challenges of security and privacy in distributed internet of things. C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016
On the features and challenges of security and privacy in distributed internet of things C. Anurag Varma achdc@mst.edu CpE 6510 3/24/2016 Outline Introduction IoT (Internet of Things) A distributed IoT
More informationGaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung
Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline
More informationEFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
More informationDESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
More informationA Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
More informationUse of Data Mining Techniques to Improve the Effectiveness of Sales and Marketing
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 4, April 2015,
More informationOPNET Network Simulator
Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,
More informationAn Implementation of Secure Wireless Network for Avoiding Black hole Attack
An Implementation of Secure Wireless Network for Avoiding Black hole Attack Neelima Gupta Research Scholar, Department of Computer Science and Engineering Jagadguru Dattaray College of Technology Indore,
More informationA Model-based Methodology for Developing Secure VoIP Systems
A Model-based Methodology for Developing Secure VoIP Systems Juan C Pelaez, Ph. D. November 24, 200 VoIP overview What is VoIP? Why use VoIP? Strong effect on global communications VoIP will replace PSTN
More informationUSTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area. CPSC 822 Case Study in Operating Systems
USTC Course for students entering Clemson F2013 Equivalent Clemson Course Counts for Clemson MS Core Area 398 / SE05117 Advanced Cover software lifecycle: waterfall model, V model, spiral model, RUP and
More informationTo Study the Various Attacks and Protocols in MANET
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 To Study the Various Attacks and Protocols in MANET Harkiranpreet Kaur 1* and Rasneet
More informationHow To Understand And Understand The Science Of Engineering In India
RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.
More informationDept. of Financial Information Security
Dept. of Financial Information Security Department of Financial Information Security offers an excellent education and interdisciplinary cutting-edge research programs to train future leaders and innovators
More informationMultisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: varshney@syr.edu
More informationSBSCET, Firozpur (Punjab), India
Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Layer Based
More informationCIDC Project Training Centre, Village Dangaharia, Post - Mirzamurad, District - Varanasi (UP) Shuttering Carpenter
Sr.No. Name Date of Birth E- Card No. Trade Testing centre Address Photo. Mr. Daya Shankar.8.98 6 55 Vill. - Distt. Varansi 2. Mr.Bhanu Pratap Singh 8.5.98 9 56 Vill. - Distt. Varansi 3. Mr. Vikarma Prasad
More informationNeural Networks in Data Mining
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 03 (March. 2014), V6 PP 01-06 www.iosrjen.org Neural Networks in Data Mining Ripundeep Singh Gill, Ashima Department
More information01219211 Software Development Training Camp 1 (0-3) Prerequisite : 01204214 Program development skill enhancement camp, at least 48 person-hours.
(International Program) 01219141 Object-Oriented Modeling and Programming 3 (3-0) Object concepts, object-oriented design and analysis, object-oriented analysis relating to developing conceptual models
More informationUse of Honeypots along with IDS in Cluster-Based MANETs
American Journal of Scientific Research ISSN 2301-2005 Issue 80 November, 2012, pp.155-163 EuroJournals Publishing, Inc. 2012 http://www.eurojournals.com/ajsr.htm Use of Honeypots along with IDS in Cluster-Based
More informationCS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
More informationRole of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network
International Journal of Electronics Engineering, 3 (2), 2011, pp. 283 286 Serials Publications, ISSN : 0973-7383 Role of Clusterhead in Load Balancing of Clusters Used in Wireless Adhoc Network Gopindra
More informationThe University of Jordan
The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S
More informationData Mining: Concepts and Techniques. Jiawei Han. Micheline Kamber. Simon Fräser University К MORGAN KAUFMANN PUBLISHERS. AN IMPRINT OF Elsevier
Data Mining: Concepts and Techniques Jiawei Han Micheline Kamber Simon Fräser University К MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF Elsevier Contents Foreword Preface xix vii Chapter I Introduction I I.
More informationAN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 AN APPROACH FOR SOFTWARE TEST CASE SELECTION USING HYBRID PSO 1 Preeti Bala Thakur, 2 Prof. Toran Verma 1 Dept. of
More informationIJMIE Volume 2, Issue 7 ISSN: 2249-0558
Evaluating Performance of Audio conferencing on Reactive Routing Protocols for MANET Alak Kumar Sarkar* Md. Ibrahim Abdullah* Md. Shamim Hossain* Ahsan-ul-Ambia* Abstract Mobile ad hoc network (MANET)
More informationIntroduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
More informationA Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1
A Secure Load Balancing Technique based on Cloud Partitioning for Public Cloud Infrastructure Nidhi Bedi 1 and Shakti Arora 1 1 Computer Science & Engineering Department, Kurukshetra University Krurkshetra/Geeta
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationCourse Curriculum for Master Degree in Electrical Engineering/Wireless Communications
Course Curriculum for Master Degree in Electrical Engineering/Wireless Communications The Master Degree in Electrical Engineering/Wireless Communications, is awarded by the Faculty of Graduate Studies
More informationCloud SQL Security. Swati Srivastava 1 and Meenu 2. Engineering College., Gorakhpur, U.P. Gorakhpur, U.P. Abstract
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 479-484 International Research Publications House http://www. irphouse.com /ijict.htm Cloud
More informationVoIP. Wireless, P2P and New Enterprise Voice over IP
Brochure More information from http://www.researchandmarkets.com/reports/2252023/ VoIP. Wireless, P2P and New Enterprise Voice over IP Description: Voice over Internet Protocol (VoIP) is revolutionizing
More informationUser Behavior Analysis from Web Log using Log Analyzer Tool
User Behavior Analysis from Web Log using Log Analyzer Tool A.Brijesh Bakariya, B.Ghanshyam Singh Thakur Department of Computer Application, Maulana Azad National Institute of Technology, Bhopal, India
More informationGURU GOBIND SINGH INDRAPRASTHA UNIVERSITY DWARKA, NEW DELHI - 110078
GURU GOBIND SINGH INDRAPRASTHA UNIVERSITY DWARKA, NEW DELHI - 110078 GGSIPU/IR-3//2013-14 DATED: 20.03.14 To, Director/Principal, Sub: Information for submitting the degree data for making the pending
More informationADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 raaj.rc586@gmail.com,
More informationLoad Balancing for Improved Quality of Service in the Cloud
Load Balancing for Improved Quality of Service in the Cloud AMAL ZAOUCH Mathématique informatique et traitement de l information Faculté des Sciences Ben M SIK CASABLANCA, MORROCO FAOUZIA BENABBOU Mathématique
More informationKeywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
More informationPerformance Analysis of Modified AODV Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks
Performance Analysis of Modified Protocol in Context of Denial of Service (Dos) Attack in Wireless Sensor Networks Ms. Shagun Chaudhary 1, Mr. Prashant Thanvi 2 1 Asst. Professor,Dept. of ECE, JIET School
More informationScientific Journal Impact Factor (SJIF): 1.711
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com OneTK: Key Distribution Center at Cloud
More informationAn Efficient Server Load Balancing using Session Management
An Efficient Server Load Balancing using Session Management S.Tharani 1, Balika.J.Chelliah 2, Dr.J.Jagadeesan 3 1 M.Tech.Computer Science and Engg, Ramapuram campus, 2 Asst.prof, Ramapuram campus, 3 Prof,
More informationSECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
More information